Medium severity5.9NVD Advisory· Published Apr 15, 2025· Updated May 12, 2026
CVE-2025-3576
CVE-2025-3576
Description
A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- access.redhat.com/errata/RHSA-2025:11487nvd
- access.redhat.com/errata/RHSA-2025:13664nvd
- access.redhat.com/errata/RHSA-2025:13777nvd
- access.redhat.com/errata/RHSA-2025:15000nvd
- access.redhat.com/errata/RHSA-2025:15001nvd
- access.redhat.com/errata/RHSA-2025:15002nvd
- access.redhat.com/errata/RHSA-2025:15003nvd
- access.redhat.com/errata/RHSA-2025:15004nvd
- access.redhat.com/errata/RHSA-2025:8411nvd
- access.redhat.com/errata/RHSA-2025:9418nvd
- access.redhat.com/errata/RHSA-2025:9430nvd
- access.redhat.com/security/cve/CVE-2025-3576nvd
- bugzilla.redhat.com/show_bug.cginvd
- cert-portal.siemens.com/productcert/html/ssa-577017.htmlnvd
- lists.debian.org/debian-lts-announce/2025/05/msg00047.htmlnvd
- web.mit.edu/kerberos/krb5-1.22/krb5-1.22.htmlnvd
News mentions
1- Siemens Ruggedcom RoxCISA Alerts